Quantum key distribution protocols in transmission control protocol
A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.30926 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.309262015-02-06T00:54:53Z Quantum key distribution protocols in transmission control protocol 2012-01 Kamarul Aizan, Nur Hanani A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN. Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) 2012-01 Thesis http://psasir.upm.edu.my/id/eprint/30926/ http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf application/pdf en public masters Universiti Putra Malaysia Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) Faculty of Computer Science and Information Technology |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Quantum theory
Computer network protocols Key agreement protocols (Computer network protocols) |
spellingShingle |
Quantum theory
Computer network protocols Key agreement protocols (Computer network protocols) Kamarul Aizan, Nur Hanani Quantum key distribution protocols in transmission control protocol |
description |
A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Kamarul Aizan, Nur Hanani |
author_facet |
Kamarul Aizan, Nur Hanani |
author_sort |
Kamarul Aizan, Nur Hanani |
title |
Quantum key distribution protocols in transmission control protocol |
title_short |
Quantum key distribution protocols in transmission control protocol |
title_full |
Quantum key distribution protocols in transmission control protocol |
title_fullStr |
Quantum key distribution protocols in transmission control protocol |
title_full_unstemmed |
Quantum key distribution protocols in transmission control protocol |
title_sort |
quantum key distribution protocols in transmission control protocol |
granting_institution |
Universiti Putra Malaysia |
granting_department |
Faculty of Computer Science and Information Technology |
publishDate |
2012 |
url |
http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf |
_version_ |
1747811607111532544 |